![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2017.0325 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2017-0325) |
Resumen: | The remote host is missing an update for the 'perl-Encode, rt' package(s) announced via the MGASA-2017-0325 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'perl-Encode, rt' package(s) announced via the MGASA-2017-0325 advisory. Vulnerability Insight: RT 4.0.0 and above are vulnerable to a limited privilege escalation leading to unauthorized modification of ticket data. The DeleteTicket right and any custom lifecycle transition rights may be bypassed by any user with ModifyTicket (CVE-2012-4733). RT 3.8.0 and above include a version of bin/rt that uses semi-predictable names when creating tempfiles. This could possibly be exploited by a malicious user to overwrite files with permissions of the user running bin/rt (CVE-2013-3368). RT 3.8.0 and above allow calling of arbitrary Mason components (without control of arguments) for users who can see administration pages. This could be used by a malicious user to run private components which may have negative side-effects (CVE-2013-3369). RT 3.8.0 and above allow direct requests to private callback components. Though no callback components ship with RT, this could be used to exploit an extension or local callback which uses the arguments passed to it insecurely (CVE-2013-3370). RT 3.8.3 and above are vulnerable to cross-site scripting (XSS) via attachment filenames. The vector is difficult to exploit due to parsing requirements. Additionally, RT 4.0.0 and above are vulnerable to XSS via maliciously-crafted 'URLs' in ticket content when RT's 'MakeClicky' feature is configured (CVE-2013-3371). RT 3.8.0 and above are vulnerable to an HTTP header injection limited to the value of the Content-Disposition header. Injection of other arbitrary response headers is not possible. Some (especially older) browsers may allow multiple Content-Disposition values which could lead to XSS. Newer browsers contain security measures to prevent this (CVE-2013-3372). RT 3.8.0 and above are vulnerable to a MIME header injection in outgoing email generated by RT (CVE-2013-3373). RT 3.8.0 and above are vulnerable to limited session re-use when using the file-based session store, Apache::Session::File. RT's default session configuration only uses Apache::Session::File for Oracle (CVE-2013-3374). RT 3.0.0 and above, if running on Perl 5.14.0 or higher, are vulnerable to a remote denial-of-service via the email gateway, any installation which accepts mail from untrusted sources is vulnerable, regardless of the permissions configuration inside RT. This denial-of-service may encompass both CPU and disk usage, depending on RT's logging configuration (CVE-2014-9472). RT 3.8.8 and above are vulnerable to an information disclosure attack which may reveal RSS feeds URLs, and thus ticket data (CVE-2015-1165). RSS feed URLs can also be leveraged to perform session hijacking, allowing a user with the URL to log in as the user that created the feed (CVE-2015-1464). RT 4.0.0 and above are vulnerable to a cross-site scripting (XSS) attack via the user and group rights management pages (CVE-2015-5475). RT 4.2.0 and above are vulnerable to a cross-site scripting (XSS) attack via the cryptography interface. ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'perl-Encode, rt' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.1 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4733 http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html http://www.osvdb.org/93611 http://secunia.com/advisories/53522 Common Vulnerability Exposure (CVE) ID: CVE-2013-3368 Debian Security Information: DSA-2670 (Google Search) http://www.debian.org/security/2012/dsa-2670 http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html http://www.osvdb.org/93612 http://secunia.com/advisories/53505 Common Vulnerability Exposure (CVE) ID: CVE-2013-3369 http://www.osvdb.org/93610 Common Vulnerability Exposure (CVE) ID: CVE-2013-3370 http://www.osvdb.org/93609 Common Vulnerability Exposure (CVE) ID: CVE-2013-3371 http://www.osvdb.org/93608 Common Vulnerability Exposure (CVE) ID: CVE-2013-3372 http://www.osvdb.org/93607 Common Vulnerability Exposure (CVE) ID: CVE-2013-3373 http://www.osvdb.org/93606 Common Vulnerability Exposure (CVE) ID: CVE-2013-3374 http://www.osvdb.org/93605 Common Vulnerability Exposure (CVE) ID: CVE-2014-9472 BugTraq ID: 72832 http://www.securityfocus.com/bid/72832 Debian Security Information: DSA-3176 (Google Search) http://www.debian.org/security/2015/dsa-3176 http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html Common Vulnerability Exposure (CVE) ID: CVE-2015-1165 Common Vulnerability Exposure (CVE) ID: CVE-2015-1464 Common Vulnerability Exposure (CVE) ID: CVE-2015-5475 BugTraq ID: 76364 http://www.securityfocus.com/bid/76364 Debian Security Information: DSA-3335 (Google Search) http://www.debian.org/security/2015/dsa-3335 http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164607.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165163.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165124.html Common Vulnerability Exposure (CVE) ID: CVE-2016-6127 BugTraq ID: 99375 http://www.securityfocus.com/bid/99375 Debian Security Information: DSA-3882 (Google Search) http://www.debian.org/security/2017/dsa-3882 Common Vulnerability Exposure (CVE) ID: CVE-2017-5361 Debian Security Information: DSA-3883 (Google Search) http://www.debian.org/security/2017/dsa-3883 Common Vulnerability Exposure (CVE) ID: CVE-2017-5943 BugTraq ID: 99384 http://www.securityfocus.com/bid/99384 Common Vulnerability Exposure (CVE) ID: CVE-2017-5944 BugTraq ID: 99381 http://www.securityfocus.com/bid/99381 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |